Security+: Installing and Configuring Network Components to Support Organizational Security


The Security+ syllabus is updated every three years. Normally, the exam is denoted by a code consisting of a sequence of letters and numbers; for example, SY0-401 is the most recently outdated exam. During the revision, a number of changes are made from the previous to the most recent exam. This article covers the most recent changes leading to the current exam – the SY0-501. We shall be covering the changes related to the Installing and configuring of network components in order to support organizational security. We shall take a look at how this is covered in the new exam and how it differs from the previous exam.

Exam Changes Overview

Between the two exams SY0-401 and SY0-501, there is a significant overall change in the content. The new exam focuses on attacks, risk management and hands-on skills using technologies and tools. As a result, the domains have been re-named and re-ordered to reflect cyber security trends as determined in the Security+ SY0-501 Job Task Analysis (JTA).

Under the previous exam (SY0-401), the installation and configuration of network components was found under the Network Security domain, and specifically under section 1.2 Network Administration Principles. which covered 20% of the exam, but is currently found within the Technologies and Tools domain (22% of the overall exam) and under section 2.1 Security Components.

Compared to the previous exam, the most recent changes ensure that candidates are able to explain the learned concepts by translating them to real-life problems.

Exam Changes Comparison

The different malicious motives targeting many organizations today may include competitor companies that are out to obtain intellectual property from rival organizations (or execute espionage missions), rogue states that might sponsor attacks against certain industries that affect target organizations, or rogue employees who might want to cause havoc (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Lester Obbayi. Read the original post at: